IEEE Systems Journal

Papers
(The H4-Index of IEEE Systems Journal is 51. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Blockchain for IoT-Based Healthcare: Background, Consensus, Platforms, and Use Cases224
Intelligent Reflecting Surface Aided Dual-Function Radar and Communication System133
Brief Survey on Attack Detection Methods for Cyber-Physical Systems127
Industry 4.0 Implementation Challenges and Opportunities: A Managerial Perspective121
Energy-Aware Hierarchical Resource Management and Backhaul Traffic Optimization in Heterogeneous Cellular Networks112
Efficient Certificateless Aggregate Signature With Conditional Privacy Preservation in IoV111
A Survey of Blockchain Applications in the Energy Sector111
Improved Perturb and Observation Maximum Power Point Tracking Technique for Solar Photovoltaic Power Generation Systems99
An Improved Adaptive Control Strategy in Grid-Tied PV System With Active Power Filter for Power Quality Enhancement95
Joint UAV Position Optimization and Resource Scheduling in Space-Air-Ground Integrated Networks With Mixed Cloud-Edge Computing93
Joint Target Assignment and Resource Optimization Framework for Multitarget Tracking in Phased Array Radar Network90
An Integral Tilt Derivative Control Strategy for Frequency Control in Multimicrogrid System89
Agile Earth Observation Satellite Scheduling Over 20 Years: Formulations, Methods, and Future Directions86
Joint Optimization Scheme for Subcarrier Selection and Power Allocation in Multicarrier Dual-Function Radar-Communication System86
Coordinated Power Management and Control of Standalone PV-Hybrid System With Modified IWO-Based MPPT85
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain83
Secure Beamforming for Cognitive Satellite Terrestrial Networks With Unknown Eavesdroppers82
A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion81
A Comprehensive Survey of Databases and Deep Learning Methods for Cybersecurity and Intrusion Detection Systems81
UAV-Assisted Wireless Localization for Search and Rescue81
Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage78
Deep Autoencoder-Based Anomaly Detection of Electricity Theft Cyberattacks in Smart Grids77
Robust Control Strategies for Microgrids: A Review76
Industrial Frameworks for Internet of Things: A Survey75
Energy-Efficient Cooperative Communication and Computation for Wireless Powered Mobile-Edge Computing72
Amassing the Security: An ECC-Based Authentication Scheme for Internet of Drones71
Joint Offloading and Resource Allocation for Satellite Assisted Vehicle-to-Vehicle Communication70
Optimal Chance-Constrained Scheduling of Reconfigurable Microgrids Considering Islanding Operation Constraints69
Joint Target Assignment and Power Allocation in Multiple Distributed MIMO Radar Networks68
Noninvasive Human Activity Recognition Using Millimeter-Wave Radar68
Optimization-Based Power and Energy Management System in Shipboard Microgrid: A Review67
A Privacy-Preserving Charging Scheme for Electric Vehicles Using Blockchain and Fog Computing63
SEMA: Secure and Efficient Message Authentication Protocol for VANETs63
New Clustering-Based Semantic Service Selection and User Preferential Model63
Efficient Medical Big Data Management With Keyword-Searchable Encryption in Healthchain63
Joint Resource Allocation and UAV Trajectory Optimization for Space–Air–Ground Internet of Remote Things Networks62
ARSH-FATI: A Novel Metaheuristic for Cluster Head Selection in Wireless Sensor Networks62
Optimal Coordinated Allocation of Distributed Generation Units/ Capacitor Banks/ Voltage Regulators by EGWA62
EV Charging Stations With a Provision of V2G and Voltage Support in a Distribution Network61
A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing57
A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network57
A Coordinated Electric Vehicle Management System for Grid-Support Services in Residential Networks56
Enhanced Security Identity-Based Privacy-Preserving Authentication Scheme Supporting Revocation for VANETs56
Price and Risk Awareness for Data Offloading Decision-Making in Edge Computing Systems55
Spectral and Energy Efficiency in Cell-Free Massive MIMO Systems Over Correlated Rician Fading54
Dynamic GPS Spoofing Attack Detection, Localization, and Measurement Correction Exploiting PMU and SCADA54
Graph Neural Networks Based Detection of Stealth False Data Injection Attacks in Smart Grids54
A Fault Detection and Classification Scheme for Unified Power Flow Controller Compensated Transmission Lines Connecting Wind Farms53
Joint Computation Offloading and Resource Allocation for Edge-Cloud Collaboration in Internet of Vehicles via Deep Reinforcement Learning53
A Secure and Multiobjective Virtual Machine Placement Framework for Cloud Data Center51
A Secure Clinical Diagnosis With Privacy-Preserving Multiclass Support Vector Machine in Clouds51
0.054473161697388